The New York Times building
08
Jun
2024

New York Times source code stolen using exposed GitHub token

Internal source code and data belonging to The New York Times was leaked on the 4chan message board after being…

Beware of Fake Google Chrome Update Pop-Ups that Installs Malware
08
Jun
2024

Beware of Fake Chrome Update Pop-Ups that Installs Malware

In the ever-changing cybersecurity landscape, a persistent threat appears in the form of a fake Chrome update.  Usually, these efforts…

GoldPickaxe iOS Malware Harvests Facial Recognition Data
08
Jun
2024

GoldPickaxe iOS Malware Harvests Facial Recognition Data

Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Store…

Jane Devry
08
Jun
2024

The Underestimated Cyber Threat: Anticipating and Combatting Supply Chain Attacks

Cybersecurity threats are multi-faceted, often connected, and accelerating fast. Ransomware, nation-state attacks, employee errors, and third parties – all pose…

DDoS
08
Jun
2024

DDoS attacks target EU political parties as elections begin

Hacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according to a…

Kimsuky APT Exploiting Facebook And MS Console For Targeted Attacks
08
Jun
2024

Kimsuky APT Exploiting Facebook And MS Console For Targeted Attacks

Facebook and MS Console are often targeted by hackers, as they contain a lot of personal and sensitive data that…

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations
08
Jun
2024

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations

Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…

Jane Devry
08
Jun
2024

Upcoming June 11th CISA Deadline Exposes Widespread Unpreparedness in Software Security Compliance

A recent study by Lineaje has uncovered a startling lack of preparedness among organizations for the upcoming U.S. Cybersecurity &…

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
08
Jun
2024

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology…

Cybersecurity On Land And At Sea
08
Jun
2024

Cybersecurity On Land And At Sea

08 Jun Cybersecurity On Land And At Sea Posted at 08:34h in Blogs by Di Freeze This week in cybersecurity…

Geopolitical Cybersecurity
08
Jun
2024

Geopolitical Cybersecurity Tension In Today’s World

By Maryam Eissa Alhammadi, Head of Cyber Security Operation Center, Ministry of Interior “Cyberattacks are not new in Geo- Politics,…

Apple Is Coming for Your Password Manager
08
Jun
2024

Apple Is Coming for Your Password Manager

That’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click…